EP4289103A1 - Threshold key exchange - Google Patents
Threshold key exchangeInfo
- Publication number
- EP4289103A1 EP4289103A1 EP22700578.2A EP22700578A EP4289103A1 EP 4289103 A1 EP4289103 A1 EP 4289103A1 EP 22700578 A EP22700578 A EP 22700578A EP 4289103 A1 EP4289103 A1 EP 4289103A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- key
- shared
- secret
- coordinator
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 78
- 238000012545 processing Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 2
- 230000001419 dependent effect Effects 0.000 claims description 2
- 238000013515 script Methods 0.000 description 42
- 238000004422 calculation algorithm Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 4
- 230000001010 compromised effect Effects 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 239000000654 additive Substances 0.000 description 2
- 230000000996 additive effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 241001441724 Tetraodontidae Species 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 238000012517 data analytics Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the present disclosure relates to a method of generating shared cryptographic keys.
- Public-key cryptography is a type of cryptographic system that uses pairs of keys: private keys which are known only to the owner of the private key, and public keys which are generated based on the corresponding private key and which may be disseminated without compromising the security of the private key.
- Public-key cryptography enables a sender to encrypt a message using a recipient's public key (i.e. the public key corresponding to a private key known only to the recipient). The encrypted message can then only be decrypted using the recipient's private key.
- This type of encryption is known as asymmetric encryption.
- symmetric encryption An alternative to asymmetric encryption is symmetric encryption.
- a secret key is used to both encrypt and decrypt a message (any data).
- the entities communicating via symmetric encryption must exchange the key so that it can be used in the decryption process.
- a sender can use their own private key to sign a message, e.g. to prove that the message is being sent by the sender, and/or to indicate that the sender agrees with the message.
- the signer i.e. the party generating the signature
- the signer uses their private key to create a digital signature on the message.
- An digital signature scheme typically involves three procedures, i.e. algorithms.
- a key generation algorithm is used to generate a random private key and a corresponding public key.
- a signing algorithm is used to generate a signature based on a message and the private key.
- a verification algorithm is used to verify, given a public key and the message, whether the signature has been generated using the corresponding private key and according to the signing algorithm.
- Threshold cryptography refers to a cryptographic system that distributes shares (sometimes called slices) of a private key between a plurality of participants. A threshold (i.e. minimum) number of those shares are required in order to re-create the private key. Depending on the particular system that is used, the private key may first be generated and then split into shares, or the shares of the private key may be generated without the private key ever existing. A message may be encrypted with the corresponding public key. A threshold number of participants must cooperate in order to decrypt the message.
- a threshold signature scheme allows a threshold number of participants in a group to create a digital signature on (i.e. of) a message using individual shares of a shared private key.
- a digital signature is a signature which is generated based on the message to be signed.
- the signature can only be created if the threshold number of participants agree to generate the signature on the message. Any attempt to generate a signature using a smaller number of participants will not generate a valid signature. Therefore, a valid signature by the group (i.e. one generated using the message and the shared private key) provably had the threshold number of people agree to generate the signature. This also implies that any adversary needs to obtain the threshold number of shares of the private key to forge a signature with that private key.
- a common feature of threshold signature shares is that if any of the private key shares are lost, the private key can still be recoverable provided that the threshold number of shares are still available.
- Diffie-Hellman key exchange refers to a protocol for generating a shared cryptographic key.
- the protocol can be summarised as follows.
- a first party and a second party each have a respective private-public key pair.
- the public keys are known to each party.
- the first party can calculate the shared key based on the elliptic curve multiplication of the first party's private key and the second party's public key.
- the second party can calculate the same shared key based on the elliptic curve multiplication of the second party's private key and the first party's public key. This allows both parties to calculate the same shared key without divulging private information. Only the two parties can calculate the shared key because only they know their respective private keys.
- DH Diffie-Hellman
- a computer-implemented method of generating a shared cryptographic key based on at least one shared secret wherein each participant belonging to a first group has a respective share of a first secret, the first secret having a first threshold and a corresponding first public key, wherein a second coordinator has a second public key corresponding to a second secret
- the method is performed by a first coordinator of the first group and comprises: obtaining, from at least the first threshold number of participants of the first group, respective shares of the shared cryptographic key, where each respective share of the shared cryptographic key is based on i) a respective share of the first secret or a respective zeroth order coefficient of a respective private polynomial used to calculate the respective share of the first secret, and ii) the second public key; and generating the shared cryptographic key based on the obtained respective shares of the cryptographic key, wherein the second coordinator is configured to generate the same shared cryptographic key.
- Embodiments of the present invention increase the security of shared keys (shared in the sense that the shared key is known to two different parties). Instead of generating a shared key based on a complete secret (e.g. a private key), the shared key is instead generated based on a shared secret (e.g. a shared private key).
- the shared secret is shared in the sense that each participant of a group has a share of a shared secret (e.g. a share of a shared private key). This shared secret is not known to two different parties.
- the shared secret may not exist as a whole secret (e.g. key) in the sense that no individual knows that key.
- the shared secret will be referred to below as a shared Diffie-Hellman (DH) key to more easily distinguish it from the group's shared secret.
- DH shared Diffie-Hellman
- the shared secret may also be referred to as a common secret, i.e. a secret common to (known to) more than one party.
- the private key shares may have been generated such that the private key never existed. The skilled person will be familiar with such techniques. Therefore no single party has access to the shared secret.
- the shared secret has a threshold, meaning that at least a threshold number of shares of the shared secret are required to reconstruct the shared secret.
- the present invention generates the shared DH key based on one party's (or entity's) public key and at least a threshold number of shares of the shared secret.
- the complete shared DH key can only be constructed if enough different shares of the shared DH key are made available. Now, given that the shared secret does not exist (i.e. it is not stored by any one participant), it cannot be compromised, making it more difficult for an attacker to obtain the shared DH key. Moreover, in the event that an attacker compromises a participant's share of the shared secret, that share does not give enough information away in order to reconstruct the shared secret nor the shared DH key. An attacker would have to compromise the threshold number of shares, which is much more difficult task than compromising a single private key.
- both parties may use shared secrets. That is, one group of participants may have shares of a first shared secret and another group of participants may have shares of a second shared secret. Each group generates respective shares of the shared DH key using the other group's public key and shares of their own group's shared secret.
- each and every participant of a group may be required to calculate a share of the shared DH key in order for that group to construct the shared DH key. This is particularly useful for use cases whereby collaboration of all participants is required.
- Figure 1 schematically illustrates an example system for generating shared keys according to some embodiments of the present invention
- Figure 2 schematically illustrates another example system for generating shared keys according to some embodiments of the present invention
- Figure 3 shows an example method for generating shared keys according to some embodiments of the present invention.
- Figure 4 schematically illustrates an example blockchain transaction protocol.
- the group over this elliptic curve is defined to be the set of elements (x,y) satisfying this equation along with the point at infinity 0, which is the identity element.
- the group operation on the elements in this group is called elliptic curve point addition and denoted by +.
- This group is denoted by a nd its order by n.
- This group operation can be used to define another operation on the elements called point multiplication denoted by •.
- point multiplication denoted by •.
- the point k • G is defined to be the point G added to itself k times.
- a private key is defined to be a scalar where is notation for the set ⁇ 1, ... , n — 1 ⁇ .
- the corresponding public key is the point k • G on an elliptic curve.
- the elliptic curve is chosen to be the secp256kl elliptic curve, and the values a, b, and p are completely specified by this curve.
- the order n of this group has been calculated given these values, which in the case of this curve is a prime, and the secp256kl standard also specifies a point
- hash(msg) SHA256(SHA256(msg))
- SHA256( ⁇ ) is the SHA-256 hash function. Note that instead the message may be hashed only once, or more that two times with the same or different hash functions.
- the ephemeral key must be kept secret, otherwise the private key can be calculated, given a message and signature. Additionally, each time a signature is generated, a different ephemeral key must be used. If this is not the case, it is possible to derive the private key a given two different signatures and their corresponding messages.
- this private key a is split into key shares that are distributed amongst participants in a threshold scheme group.
- each participant agrees on the unique label i for each participant.
- Each participant i generates (t + 1) random numbers where ⁇ R means a randomly generated element of the set where is notation for the set ⁇ 1, ... , n — 1 ⁇ .
- each participant has a secret polynomial of order t for Note that we omit the mod n notation from now on, and it is assumed that all arithmetic operations over integers are done modulo n.
- Each participant i sends the value f i (j) to participant j e.g. using a secure communication channel with participant j only.
- a shared secret share is a point with the form (i, a i ), where i is the participants label in the scheme.
- JVRSS typically stands for "Joint verification random secret sharing” and includes steps 4 and 5 as well.
- JVRSS is taken to mean performing at least steps 1 to 3, where steps 4 and 5 are optional steps.
- Each participant i checks that each participant j has correctly calculated the polynomial point fj(i) by calculating fj(i) . G and verifying that
- Each participant calculates their own multiplicative share pi using ⁇ i — a i b i .
- Each participant interpolates over at least (2t + 1) of the shares ⁇ i at 0 to calculate
- a group of size N with a shared private key a of threshold (t + 1) execute the following steps:
- FIG. 1 illustrates an example system 100 for generating a shared key.
- the system 100 comprises a first party which comprises a first coordinator 101 and a first group of participants 102. Only three participants 102 are shown in Figure 1, but it will be appreciated that in general the first group may comprise any number of participants.
- the first coordinator 101 is shown as being distinct from the participants 102, but in some embodiments the first coordinator 101 may also be one of the participants 102, e.g. the first participant 102a.
- a second party comprising a second coordinator 103.
- the second party may also comprise a second group of participants 104.
- the second group may in general comprise any number of participants 104.
- Each of the respective computing equipment comprises respective processing apparatus comprising one or more processors, e.g. one or more central processing units (CPUs), accelerator processors (GPUs), application specific processors and/or field programmable gate arrays (FPGAs).
- the respective computing equipment may also comprise memory, i.e. computer-readable storage in the form of a non-transitory computer- readable medium or media.
- the memory may comprise one or more memory units employing one or more memory media, e.g.
- the respective computing equipment may comprise at least one user terminal, e.g. a desktop or laptop computer, a tablet, a smartphone, or a wearable device such as a smartwatch. Alternatively or additionally, the respective computing equipment may comprise one or more other networked resources, such as cloud computing resources accessed via the user terminal (the cloud computing resources comprising resources of one or more physical server devices implemented at one or more sites). It will be appreciated that any act described as being performed by a party (e.g. coordinator, participant, etc.) may be performed by the respective computing apparatus operated by that party.
- a party e.g. coordinator, participant, etc.
- the first coordinator 101 (on behalf of the first group of participants) and the second coordinator 103 wish to generate a shared key.
- This key will be referred to as a shared Diffie-Hellman (DH) key.
- DH Diffie-Hellman
- This label is used merely for convenience and does not place any limitations on the key other than those imposed by the present description.
- the second coordinator 103 has a public key corresponding to a private key. "Having" a key means storing that key in memory, or being otherwise able to access and retrieve that key. For example, a key may be written down on paper and then input to a device, e.g. via a user interface.
- the private key is a complete (i.e. full, whole, etc.) key.
- a private key may be said to be a complete key if it directly maps, by way of a generator point, to the corresponding public key.
- Each participant 102 of the first group has a share (a "private key share") of a private key.
- This private key will be referred to as the first private key.
- the private key associated with the second coordinator 103 will be referred to as the second private key.
- the first private key and the second private key are different keys (e.g. different integers).
- the first coordinator 101 also has a share of the first private key.
- the first private key is a threshold private key. This means that at least a threshold number of the first private key shares are required to reconstruct the first private key.
- Techniques for generating shares of a threshold private key per se will be familiar to the skilled person.
- One such technique is known as joint verifiable random secret sharing (JVRSS) and is described above.
- JVRSS joint verifiable random secret sharing
- SSSS Shamir's secret sharing scheme
- the first group of participants may each use SSSS to obtain their respective shares of the first private key.
- SSSS requires a coordinator 101, whereas JVRSS does not.
- Another technique for generating and distributing private key shares is described in W02017145010A1.
- the first private key has a corresponding public key - a first public key.
- the first public key may be known to the first coordinator 101 and/or one, some or all of the participants 102.
- the first coordinator 101 may obtain a public key (a second public key) corresponding to the second private key.
- the second coordinator 103 may transmit the second public key to the first coordinator 101.
- the second public key may be obtained from a publicly accessible source such as a website or a blockchain.
- the first coordinator 101 may already have access to the second public key, e.g. it may be stored in memory.
- the first coordinator 101 may send the second public key to some or all of the participants 102 of the first group.
- the first coordinator 101 may send the second the second public key to each participant 102 separately, or the first coordinator 101 may broadcast the second public key to the first group. It is also not excluded that some or all of the participants 102 may already have access to the second public key, in which case the first coordinator 101 does not have to send the second public key to those participants 102, although the first coordinator 101 may still choose to do so.
- the first coordinator 101 obtains at least a threshold number of respective shares of a shared DH key. For example, the first coordinator 101 may send (e.g. broadcast) a request to the participants 102 for a respective share of the shared DH key. As shown in Figure 1, in some embodiments not all of the participants are required to generate a share of the shared DH key. This will depend on the threshold of the first private key. Each share of the shared DH key is generated based on (i.e. is a function of) a different respective share of the first private key, i.e. each share of the shared DH key is generated by a different participant 102. Each share of the shared DH key is also generated based on the second public key.
- each participant either already has the second public key or it may be obtained from the first coordinator 101.
- one of the shares is generated by the first coordinator 101.
- Each share of the shared DH key may be generated by performing elliptic curve multiplication of the respective first private key share and the second public key. It is not excluded that the shares of the shared DH key are calculated using alternative mathematical operations.
- Each of the participants 102 that generates a share of the shared DH key may transmit their share directly to the first coordinator 101, or via one or more other participants.
- the shares may be transmitted over a secure communication channel.
- the shared DH key is a function of the obtained shares.
- the shared DH key may be obtained by performed elliptic curve interpolation of the shares of the shared DH key.
- the second coordinator 103 is configured to generate the same shared DH key.
- the second coordinator 103 generates the shared DH key based on the first public key and the second private key. In this case the second coordinator has access to the full second private key, i.e. not just a share of the second private key.
- the second coordinator 101 may already have access to the first public key, e.g. it may be obtained from a publicly accessible source such as the blockchain. Alternatively, the first coordinator 101 may send the first public key to the second coordinator 103.
- each participant 102 may have a share of the first public key corresponding to their respective share of the first private key.
- the first coordinator 101 may require a threshold number of shares of the first public key in order to generate the first public key, before sending it to the second coordinator 103.
- the first private key shares may be generated using JVRSS or an equivalent scheme.
- each participant of the first group has a respective zeroth order coefficient of a private polynomial (e.g. see step 1 of the JVRSS method described above).
- each participant instead of calculating their respective share of the shared DH key based on their respective share of the first private key, each participant generates their respective share based on their respective zeroth order coefficient.
- Each share of the shared DH key is also based on the second public key. In these examples, a respective shared of the shared DH key must be obtained from each participant 102.
- the second private key may be a threshold private key and each participant 104 of the second group may have a share of the second private key.
- the second coordinator 103 may perform equivalent operations to the first coordinator in order to generate the shared DH key based on respective shares of the shared DH key generated by the participants 104 of the second group.
- the participants of the second group may generated shares of the shared DH key based on the first public key and either their respective share of the second private key, or their respective zeroth order coefficient of their respective private polynomial.
- both the first coordinator 101 and the second coordinator 103 will have the same shared DH key.
- the shared DH key may then be used to encrypt messages, i.e. any type of data.
- the first coordinator 101 may encrypt a message and send the encrypted message to the second coordinator 103, or vice versa.
- the message may comprise personal and/or confidential information, e.g. financial data, medical data, prescription data, etc.
- the message may comprise a contract or other type of document.
- the shared DH key may be used as a symmetric encryption key, in which case it can be used to both encrypt and decrypt messages.
- Any suitable symmetric encryption scheme may be used, e.g. data encryption standard (DES), triple DES, Blowfish, advanced encryption standard (AES), Rivest Cipher 4 (RC4), RC5, or RC6.
- DES data encryption standard
- Triple DES triple DES
- Blowfish advanced encryption standard
- AES advanced encryption standard
- RC4 Rivest Cipher 4
- RC5 Rivest Cipher 4
- the first coordinator 101 may receive an encrypted message from the second coordinator 103 which has been encrypted with the shared DH key.
- the first coordinator 101 may then use the shared DH key to decrypt the message (i.e. decrypt the ciphertext to obtain the plaintext message).
- the shared DH key may be used as an asymmetric key, e.g. a public key.
- a message may be encrypted with the shared DH key such that it can only be decrypted with the corresponding private key.
- the first coordinator 101 nor the second coordinator 103 has enough information to compute the corresponding private key. In order to do so, the first coordinator 101 and the second coordinator 103 may perform threshold computation (e.g. interpolation over the private key shares) to compute the private key corresponding to the shared DH key.
- the first coordinator 101 may generate a digital signature based on a message to be signed and the private key.
- the second coordinator 103 may also generate a digital signature using the private key.
- a blockchain transaction may be created (e.g. by the first coordinator 101 or the second coordinator) that comprises an output locked to the shared DH key.
- the first coordinator 101 or the second coordinator 102 may unlock the output by generating a blockchain transaction that comprises an input referencing the output of the earlier blockchain transaction, and comprising a digital signature generated using the private key and a message comprising at least part of the transaction.
- the first coordinator 101 may generate one or more additional cryptographic keys based on the shared DH key.
- the shared DH key may be input to a hash function (e.g.
- the hash digest may be used as an additional cryptographic key.
- the shared DH key may be hashed multiple times to generate multiple additional cryptographic keys. Additional cryptographic keys may be generated in alternative ways. For instance, the shared DH key may be combined with a different key (e.g. a different public key) using point addition.
- the second coordinator 103 can perform the same operation(s) as the first coordinator to generate the same additional cryptographic keys. This allows many keys to be generated from the same shared DH key, e.g. to prevent key re-use.
- Figure 3 shows an example method 300 for generating a shared DH key. It will be appreciated that some of the steps are optional.
- the first coordinator 101 obtains a second public key, e.g. from the second coordinator 103.
- the first coordinator sends a request to the participants 102 of the first group, requesting shares of the shared DH key (the common secret).
- the first coordinator 101 obtains at least a threshold number of shared DH key shares.
- the first coordinator 101 computes the shared DH key.
- the shared DH key may then be used for, among other things, encrypting messages.
- Bob is equivalent to the first coordinator 101 and Alice is equivalent to the second coordinator 103.
- a shared DH key where at least one of the keys is a shared secret between a group of N participants, the following steps may be taken. Assume that Alice wants to create a secret channel with Bob's threshold group. That is, Bob's group has N participants, each with a share b i of the private key b and assume that (t + 1) of them would need to cooperate to calculate the private key. The corresponding public keys of Alice and Bob's group are assumed to be public.
- Alice 103 receives the public key of Bob's group b . G and calculates a(b . G) using point multiplication.
- a coordinator Bob 101 of Bob's group requests at least (t + 1) shares of a shared DH key using a . G.
- At least (t + 1) participants in Bob's group calculate b i (a . G) using Alice's public key.
- b(a • G) ECinterpolate(b 1 ( a . G ), ..., b t+1 (a • G))
- ECinterpolate is the same as the equation for normal interpolation but using point addition instead of the usual addition over the natural numbers.
- the shared key may be used for symmetric or asymmetric encryption. If used for the latter, the corresponding private key ab may be calculated using threshold computation.
- Alice 103 receives the public key of Bob's group b . G and calculates a(b . G).
- a coordinator Bob 101 of Bob's group requests all N participants to calculate a share of a DH key using a . G.
- the N participants in Bob's group calculate b i0 a • G) using Alice's public key, where b i0 is the zeroth order of participant i's private polynomial.
- the N participants send their share to Bob 101 using a secure communication channel or broadcasting to the scheme participants only.
- Bob 101 calculates the shared DH key using
- the participants should preferably send their shares via a secure communication channel with Bob 101. If they send their share on a public network and they are obtained, then anyone may be able to calculate the shared DH key. This contradicts that the shared DH key should be a shared secret between Alice 103 and Bob's group.
- the two methods may be combined. For example, Bob's group may calculate the shared DH key using the first method whilst Alice's group calculates the shared DH key using the second method, or vice versa.
- the first method is slightly slower than the second method, but it allows for the shared DH key to be recovered if lost.
- the second method is faster than the first method, but the shared DH key is not recoverable if a participant of Bob's group loses their respective share of their shared private key.
- the shared DH key may still be calculated by Alice.
- the second method is desirable if the use case benefits from contribution by all participants.
- Embodiments of the present invention may be used for a variety of use cases, and in particular ones where it is desirable to remove the single point of failure associated with a private key. For instance, if a full private key is lost then a shared key generated based on the private key is not recoverable. Furthermore, if a shared key is generated based on a full private key and that private key is stolen or otherwise compromised, then any message encrypted with the shared key may be decryptable (depending on how the shared key is generated). Embodiments of the present invention are also particularly advantageous where increased security of a message is important such that the message is not easily decryptable. For instance, it is important to keep sensitive data, such as a patient's medical history, safe and secure.
- the shared DH key may be used to encrypt and share a patient's medical data.
- a patient may choose to share his/her medical data with a third party service provider or data company. E.g. the patient may sell his/her data to a data analytics company.
- the patient (equivalent to the second coordinator 103) may have a private-public key pair.
- the service provider, the patient and the patient's doctor (equivalent to the first group of participants 102, with the service provider also being the first coordinator 101) may each have shares of a shared private key. At least two of the three parties in this example are required to construct the shared DH key.
- the patient and the service provider use embodiments of the present invention to construct the shared DH key.
- the service provider will only be able to construct the same shared DH key if the patient and/or their doctor provide a share of the shared DH key to the service provider.
- the patient may then encrypt his/her medical data with the shared DH key and send the encrypted data to the service provider.
- the service provider may then use the shared DH key to decrypt and gain access to the patient's medical data.
- a shared DH key may be used to share media content, e.g. as part of a streaming service.
- a content provider (second coordinator 103) may want to stream a movie to a user.
- the content provider has a private-public key pair.
- the content provider and the user have shares of a shared private key.
- the user is equivalent to the first coordinator 101.
- the content provider generates a shared DH key using its private key and the public key corresponding to the shared private key.
- the content provider encrypts part or all of the movie and sends the encrypted data to the user.
- the user may generate a share of the shared DH key using the user's share of the private key and the content provider's public key.
- the present invention can be used to encrypt any message.
- the message may be part or all of a blockchain transaction. Additionally or alternatively, the encrypted message may be included in a blockchain transaction.
- Threshold signature schemes have been briefly discussed above. With such a scheme, embodiments of the present invention may be used to store an encrypted share of a shared secret, i.e. a share of a private key used to generate a share of the threshold signature.
- the share of the shared secret is lost, the share can be recovered with a threshold number of participants agreeing to decrypt the share for the participant who has lost their share.
- Figure 4 illustrates an example transaction protocol for use as part of a blockchain protocol.
- Example blockchain protocols are well documented in the literature, but a description of an example protocol transaction is provided here for completeness. This is an example of a UTXO-based protocol.
- a transaction 152 (abbreviated "Tx") is the fundamental data structure of the blockchain (each block of the blockchain comprising one or more transactions 152). The following will be described by reference to an output-based or "UTXO" based protocol. However, this not limiting to all possible embodiments.
- each transaction (“Tx") 152 comprises a data structure comprising one or more inputs 202, and one or more outputs 203.
- Each output 203 may comprise an unspent transaction output (UTXO), which can be used as the source for the input 202 of another new transaction (if the UTXO has not already been redeemed).
- the UTXO includes a value specifying an amount of a digital token, e.g. representing an amount of a digital asset. This represents a set number of tokens on the (distributed) ledger.
- the UTXO may also contain the transaction ID of the transaction from which it came, amongst other information.
- the transaction data structure may also comprise a header 201, which may comprise an indicator of the size of the input field(s) 202 and output field(s) 203.
- the header 201 may also include an ID of the transaction.
- the transaction ID is the hash of the transaction data (excluding the transaction ID itself) and stored in the header 201 of the raw transaction 152 submitted to the miners.
- a first user e.g. Alice
- Alice's new transaction 152j is labelled " TxT . It takes an amount of the digital token that is locked to Alice in the output 203 of a preceding transaction 152i in the sequence, and transfers at least some of this to Bob.
- the preceding transaction 152i is labelled “Tx0" in Figure 4.
- Tx0 and Txi are just arbitrary labels. They do not necessarily mean that Tx0 ⁇ s the first transaction in the blockchain, nor that Txi is the immediate next transaction in the pool. Txi could point back to any preceding (i.e. antecedent) transaction that still has an unspent output 203 locked to Alice.
- the preceding transaction Txo may already have been validated and included in the blockchain at the time when Alice creates her new transaction Txi, or at least by the time she sends it to the network 106. It may already have been included in one of the blocks at that time, or it may be still waiting in the pool 154 in which case it will soon be included in a new block. Alternatively Txo and Txi could be created and sent to the blockchain network together, or Txo could even be sent after Txi if the node protocol allows for buffering "orphan" transactions.
- One of the one or more outputs 203 of the preceding transaction Tx0 comprises a particular UTXO, labelled here UTXOo.
- Each UTXO comprises a value specifying an amount of the digital token represented by the UTXO, and a locking script which defines a condition which must be met by an unlocking script in the input 202 of a subsequent transaction in order for the subsequent transaction to be validated, and therefore for the UTXO to be successfully redeemed.
- the locking script locks the amount to a particular party (the beneficiary of the transaction in which it is included). Ie. the locking script defines an unlocking condition, typically comprising a condition that the unlocking script in the input of the subsequent transaction comprises the cryptographic signature of the party to whom the preceding transaction is locked.
- the locking script (aka scriptPubKey) is a piece of code written in the domain specific language recognized by the node protocol. A particular example of such a language is called "Script" (capital S).
- the locking script specifies what information is required to spend a transaction output 203, for example the requirement of Alice's signature. Unlocking scripts appear in the outputs of transactions.
- the unlocking script (aka scriptSig) is a piece of code written the domain specific language that provides the information required to satisfy the locking script criteria. For example, it may contain Bob's signature. Unlocking scripts appear in the input 202 of transactions.
- UTX00in the output 203 of Tx0 com prises a locking script [Checksig PA] which requires a signature Sig PA of Alice in order for UTXOo to be redeemed (strictly, in order for a subsequent transaction attempting to redeem UTXOo to be valid).
- [Checksig PA] contains the public key PA from a public-private key pair of Alice.
- the input 202 of Txi comprises a pointer pointing back to Txi (e.g. by means of its transaction ID, TxIDo, which in embodiments is the hash of the whole transaction Tx0).
- the input 202 of Txi comprises an index identifying UTX00 within Tx0, to identify it amongst any other possible outputs of Tx0.
- the input 202 of Txi further comprises an unlocking script ⁇ Sig PA> which comprises a cryptographic signature of Alice, created by Alice applying her private key from the key pair to a predefined portion of data (sometimes called the "message" in cryptography). What data (or “message”) needs to be signed by Alice to provide a valid signature may be defined by the locking script, or by the node protocol, or by a combination of these.
- the node applies the node protocol. This comprises running the locking script and unlocking script together to check whether the unlocking script meets the condition defined in the locking script (where this condition may comprise one or more criteria). In embodiments this involves concatenating the two scripts:
- the blockchain node deems Txi valid. If it is a mining node, this means it will add it to the pool of transactions awaiting proof-of-work. If it is a forwarding node, it will forward the transaction Txi to one or more other nodes in the blockchain network, so that it will be propagated throughout the network. Once Txi has been validated and included in the blockchain, this defines UTX0 0 from Tx0as spent. Note that Tx1 can only be valid if it spends an unspent transaction output 203.
- Tx1 will be invalid even if all the other conditions are met.
- the node 104 also needs to check whether the referenced UTXO in the preceding transaction Tx0 is already spent (has already formed a valid input to another valid transaction). This is one reason why it is important for the blockchain 150 to impose a defined order on the transactions.
- a given node 104 may maintain a separate database marking which UTXOs 203 in which transactions have been spent, but ultimately what defines whether a UTXO has been spent is whether it has already formed a valid input to another valid transaction in the blockchain. If the total amount specified in all the outputs 203 of a given transaction is greater than the total amount pointed to by all its inputs 202, this is another basis for invalidity in most transaction models. Therefore such transactions will not be propagated nor mined into blocks.
- script code is often represented schematically (i.e. not the exact language).
- [Checksig PA] OP_DUP OP_HASH160 ⁇ H(PA)> OP_EQUALVERIFY OP_CHECKSIG.
- OP_ -- refers to a particular opcode of the Script language.
- OP_CHECKSIG also called “Checksig” is a Script opcode that takes two inputs (signature and public key) and verifies the signature's validity using the Elliptic Curve Digital Signature Algorithm (ECDSA).
- EDSA Elliptic Curve Digital Signature Algorithm
- any occurrences of signature are removed from the script but additional requirements, such as a hash puzzle, remain in the transaction verified by the 'sig' input.
- OP_RETURN is an opcode of the Script language for creating an unspendable output of a transaction that can store metadata within the transaction, and thereby record the metadata immutably in the blockchain.
- the metadata could comprise a document which it is desired to store in the blockchain.
- the signature PA is a digital signature. In embodiments this is based on the ECDSA using the elliptic curve secp256kl.
- a digital signature signs a particular piece of data. In embodiments, for a given transaction the signature will sign part of the transaction input, and all or part of the transaction output. The particular parts of the outputs it signs depends on the SIGHASH flag.
- the SIGHASH flag is a 4-byte code included at the end of a signature to select which outputs are signed (and thus fixed at the time of signing).
- the locking script is sometimes called "scriptPubKey” referring to the fact that it comprises the public key of the party to whom the respective transaction is locked.
- the unlocking script is sometimes called “scriptSig” referring to the fact that it supplies the corresponding signature.
- the scripting language could be used to define any one or more conditions.
- the more general terms “locking script” and “unlocking script” may be preferred.
- a transaction may be a pay-to- public-key-hash (P2PKH) output which is locked to a hash of the shared DH key.
- P2PKH pay-to- public-key-hash
- unlocking script In order to be unlocked, an input of a later transaction that references the P2PKH output needs to include the (unhashed) shared DH key and a signature generated based on the private key corresponding to the shared DH key.
- the "locking script” and “unlocking script” may take the following forms:
- a computer-implemented method of generating a shared cryptographic key based on at least one shared secret wherein each participant belonging to a first group has a respective share of a first secret, the first secret having a first threshold and a corresponding first public key, wherein a second coordinator has a second public key corresponding to a second secret
- the method is performed by a first coordinator of the first group and comprises: obtaining, from at least the first threshold number of participants of the first group, respective shares of the shared cryptographic key, where each respective share of the shared cryptographic key is based on i) a respective share of the first secret or a respective zeroth order coefficient of a respective private polynomial used to calculate the respective share of the first secret, and ii) the second public key; and generating the shared cryptographic key based on the obtained respective shares of the cryptographic key, wherein the second coordinator is configured to generate the same shared cryptographic key.
- Statement 2 The method of statement 1, wherein the coordinator is one of said participants belonging to the first group.
- Statement 3 The method of statement 1 or statement 2, comprising: obtaining the second public key; and transmitting the second public key to each participant of the first group.
- Statement 4 The method of any preceding statement, comprising transmitting the first public key to second coordinator.
- Statement 5 comprising: obtaining, from at least the first threshold number of participants of the first group, respective shares of the first public key, wherein each respective share of the first public key is based on the respective share of the first secret and a public key generator.
- Statement 6 The method of statement 3 or any statement dependent thereon, wherein said obtaining of the second public key comprises receiving the second public key from the second coordinator.
- Statement 8 The method of any of statements 1 to 6, wherein said respective share of the shared cryptographic key is generated based on the respective zeroth order coefficient of a respective private polynomial used to calculate the respective share of the first secret, wherein said obtaining of the respective shares of the shared cryptographic key comprises obtaining a respective share of the shared cryptographic key from each of the first group of participants, and wherein said generating of the shared cryptographic key comprises performing point addition of the obtained respective shares of the shared cryptographic key.
- Statement 9 The method of any preceding statement, comprising encrypting a first message with the shared cryptographic key.
- Statement 10. The method of statement 9, comprising transmitting the encrypted first message to the second coordinator and/or to a different party.
- Statement 11 The method of statement 9 or statement 10, comprising: generating a blockchain transaction, wherein the blockchain transaction comprises the encrypted message; and making the blockchain transaction available to one or more nodes of a blockchain network.
- Statement 12 The method of any preceding statement, wherein the shared cryptographic key is a symmetric key, wherein a second message has been encrypted with the shared cryptographic key, and wherein the method comprises decrypting the second message using the shared cryptographic key.
- Statement 13 The method of any preceding statement, comprising: obtaining a private key corresponding to the shared cryptographic key; and generating a digital signature using the corresponding private key, and/or using the corresponding private key to decrypt a third message that has been encrypted with the shared cryptographic key.
- Statement 14 The method of statement 13, wherein a first blockchain transaction comprises an output locked to the shared cryptographic key, and wherein the method comprises generating a second blockchain transaction having an input that references the output of the first blockchain transaction and comprises the digital signature for unlocking said output.
- Statement 15 The method of any preceding statements, comprising generating one or more additional cryptographic keys based on the shared cryptographic key.
- Statement 16 The method of statement 15, wherein said generating of the one or more additional cryptographic keys comprises applying a hash function to the shared cryptographic key.
- Statement 17 The method of any preceding statement, wherein the second secret is a shared secret, wherein a second group comprises a plurality of participants, and wherein each participant of the second group has a respective share of a second secret, the second secret having a second threshold.
- Statement 18 The method of statement 17, wherein each participant of the second group has a respective zeroth order coefficient of a respective private polynomial used to calculate the respective share of the second secret.
- Computer equipment comprising: memory comprising one or more memory units; and processing apparatus comprising one or more processing units, wherein the memory stores code arranged to run on the processing apparatus, the code being configured so as when on the processing apparatus to perform the method of any of statements 1 to 18.
- Statement 20 A computer program embodied on computer-readable storage and configured so as, when run on computer equipment, to perform the method of any of statements 1 to 18.
- a method comprising the actions of the first participant and the key generator.
- a system comprising the computer equipment of the first participant and the key generator.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB2101590.4A GB2603495A (en) | 2021-02-05 | 2021-02-05 | Generating shared keys |
PCT/EP2022/050116 WO2022167163A1 (en) | 2021-02-05 | 2022-01-05 | Threshold key exchange |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4289103A1 true EP4289103A1 (en) | 2023-12-13 |
Family
ID=74878980
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP22700578.2A Pending EP4289103A1 (en) | 2021-02-05 | 2022-01-05 | Threshold key exchange |
Country Status (8)
Country | Link |
---|---|
US (1) | US20240097894A1 (en) |
EP (1) | EP4289103A1 (en) |
JP (1) | JP2024506026A (en) |
KR (1) | KR20230141845A (en) |
CN (1) | CN116830523A (en) |
GB (1) | GB2603495A (en) |
TW (1) | TW202232913A (en) |
WO (1) | WO2022167163A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI825997B (en) * | 2022-09-16 | 2023-12-11 | 瑞昱半導體股份有限公司 | Programmable secure management device and control method for performing key forwarding between secure devices |
CN115378617B (en) * | 2022-10-21 | 2023-01-10 | 三未信安科技股份有限公司 | Block chain threshold signature method and system thereof |
CN116541872B (en) * | 2023-07-07 | 2024-04-09 | 深圳奥联信息安全技术有限公司 | Data information safety transmission method and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3132560A4 (en) * | 2014-04-17 | 2017-12-20 | Hrl Laboratories, Llc | A method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ecdsa) based digital signatures with proactive security |
GB2561729A (en) | 2016-02-23 | 2018-10-24 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
US20210089676A1 (en) * | 2018-02-16 | 2021-03-25 | Ecole Polytechnique Fédérale De Lausanne Epfl-Tto | Methods and systems for secure data exchange |
WO2019246206A1 (en) * | 2018-06-20 | 2019-12-26 | Iot And M2M Technologies, Llc | An ecdhe key exchange for server authentication and a key server |
-
2021
- 2021-02-05 GB GB2101590.4A patent/GB2603495A/en active Pending
- 2021-12-16 TW TW110147256A patent/TW202232913A/en unknown
-
2022
- 2022-01-05 JP JP2023547478A patent/JP2024506026A/en active Pending
- 2022-01-05 WO PCT/EP2022/050116 patent/WO2022167163A1/en active Application Filing
- 2022-01-05 KR KR1020237029861A patent/KR20230141845A/en unknown
- 2022-01-05 EP EP22700578.2A patent/EP4289103A1/en active Pending
- 2022-01-05 CN CN202280012464.7A patent/CN116830523A/en active Pending
- 2022-01-05 US US18/275,372 patent/US20240097894A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US20240097894A1 (en) | 2024-03-21 |
KR20230141845A (en) | 2023-10-10 |
CN116830523A (en) | 2023-09-29 |
GB2603495A (en) | 2022-08-10 |
GB202101590D0 (en) | 2021-03-24 |
TW202232913A (en) | 2022-08-16 |
JP2024506026A (en) | 2024-02-08 |
WO2022167163A1 (en) | 2022-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113424185B (en) | Fast inadvertent transmission | |
US9705683B2 (en) | Verifiable implicit certificates | |
US20240097894A1 (en) | Threshold key exchange | |
US20220021526A1 (en) | Certificateless public key encryption using pairings | |
US11563566B2 (en) | Key splitting | |
CN115804061A (en) | Generating a shared private key | |
CN113711564A (en) | Computer-implemented method and system for encrypting data | |
JP2020532177A (en) | Computer-implemented systems and methods for advanced data security, high-speed encryption, and transmission | |
JP2023547156A (en) | Identifying denial of service attacks | |
Lizama-Pérez et al. | Public hash signature for mobile network devices | |
US20230163977A1 (en) | Digital signatures | |
US20240121109A1 (en) | Digital signatures | |
KR20220142254A (en) | Multi-signature wallet system in blockchain using the bloom filter | |
JP2006227411A (en) | Communications system, encryption device, key generator, key generating method, restoration device, communication method, encryption method, and cryptography restoration method | |
EP4423961A1 (en) | Generating shared keys | |
JP2024534237A (en) | Generate a shared encryption key | |
Omono et al. | Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds | |
CN113141249B (en) | Threshold decryption method, system and readable storage medium | |
CN118266189A (en) | Generating a shared encryption key | |
KR20240141783A (en) | Generating a shared private key | |
CN117223252A (en) | Nested threshold signatures | |
CN117837127A (en) | Generating digital signatures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230314 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40104917 Country of ref document: HK |